Chapter 8 Desktop and Server OS Vulnerabilities. Hands-On Ethical Hacking and Network Defense Second Edition. Objectives. After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Desktop and Server OS Vulnerabilities
Table 8-4 Linux vulnerabilities found at CVE
Figure 8-6 OpenVAS revealing a security hole resulting from a Firefox vulnerability
Figure 8-7 OpenVAS revealing a security hole resulting from a DHCP client vulnerability